Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-39133: cwe-787 Out-of-bounds Write in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8022

0
Medium
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8022

Description

In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.

AI-Powered Analysis

AILast updated: 06/24/2025, 02:59:26 UTC

Technical Analysis

CVE-2022-39133 is a medium-severity vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8022. These chipsets are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability is classified as a CWE-787 Out-of-Bounds Write, indicating that the driver lacks proper bounds checking when handling certain data, which can lead to writing outside the allocated memory buffer. This flaw can be exploited locally by an attacker with limited privileges (low privileges required) and does not require user interaction. The impact of this vulnerability is a denial of service (DoS) condition affecting WLAN services, potentially causing the wireless network interface to crash or become unresponsive. The CVSS v3.1 score is 5.5 (medium), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability. No known exploits have been reported in the wild, and no patches have been explicitly linked, suggesting that mitigation may rely on vendor firmware or driver updates. The vulnerability affects the WLAN driver specifically, which is critical for network connectivity on affected devices. Given the nature of the flaw, exploitation would likely require local access to the device, such as through a malicious app or compromised user environment, to trigger the out-of-bounds write and cause WLAN service disruption.

Potential Impact

For European organizations, the primary impact of CVE-2022-39133 is the potential disruption of wireless network connectivity on devices using affected Unisoc chipsets. This can result in denial of service conditions on mobile devices, impacting business continuity, especially for organizations relying heavily on mobile communications and wireless access. While the vulnerability does not compromise confidentiality or integrity, the loss of availability can hinder operations, delay communications, and reduce productivity. Sectors with high mobile device usage, such as telecommunications, logistics, and field services, may experience operational challenges. Additionally, organizations deploying Bring Your Own Device (BYOD) policies could face increased risk if employees use vulnerable devices, potentially leading to localized network outages or degraded service quality. The fact that exploitation requires local access limits the threat to scenarios where attackers have physical or software-level access to the device, reducing the risk of remote widespread attacks. However, targeted attacks or insider threats could leverage this vulnerability to disrupt wireless services.

Mitigation Recommendations

1. Device Inventory and Identification: Organizations should identify and inventory devices using Unisoc chipsets listed as affected, focusing on Android 10, 11, and 12 devices. 2. Firmware and Driver Updates: Engage with device manufacturers and vendors to obtain and deploy the latest firmware or driver updates that address this vulnerability. Even though no explicit patch links are provided, vendors may have released updates post-disclosure. 3. Restrict Local Access: Implement strict controls to prevent unauthorized local access to devices, including enforcing strong device lock policies, disabling installation of untrusted applications, and monitoring for suspicious local activity. 4. Application Whitelisting and Mobile Device Management (MDM): Use MDM solutions to control app installations and enforce security policies that reduce the risk of malicious apps exploiting the vulnerability. 5. Network Segmentation and Monitoring: Segment wireless networks and monitor WLAN service stability to quickly detect and respond to denial of service incidents potentially caused by exploitation attempts. 6. User Awareness: Educate users about the risks of installing untrusted applications and the importance of device security hygiene to minimize local exploitation opportunities. 7. Incident Response Preparedness: Prepare incident response plans to handle WLAN service disruptions, including fallback connectivity options and rapid device remediation procedures.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf155e

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 2:59:26 AM

Last updated: 2/7/2026, 8:44:26 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats